The advances in humanoid robots in recent years have given researchers new opportunities to study and create algorithms for generating humanoid behaviors. Not surprisingly, most approaches for creating or modifying be...
详细信息
ISBN:
(纸本)1424401992
The advances in humanoid robots in recent years have given researchers new opportunities to study and create algorithms for generating humanoid behaviors. Not surprisingly, most approaches for creating or modifying behaviors for complex humanoids require specialized knowledge and a large amount of work. Our aim is to provide an alternative, intuitive way to program humanoid behavior. To do this, we examine human-to-human skill transfer, specifically coaching, and adapt it to the humanoid setting. We enable a real-time scenario where a person, acting as a coach, interactively directs humanoid behavior to a desired outcome. This tightly coupled interaction between a person and a humanoid allows efficient, directed learning of new behaviors, where behavior characteristics can be modified on-demand. Communication is realized through demonstration and a coaching vocabulary, and changes are effected by transformation functions acting in the behavior domain
Research in the fields of physics, chemistry and electronics has demonstrated that quantum-dot cellular automata (QCA) is a viable alternative for nano-scale computing. However, little work on QCA has studied designin...
详细信息
ISBN:
(纸本)0769525334;9780769525334
Research in the fields of physics, chemistry and electronics has demonstrated that quantum-dot cellular automata (QCA) is a viable alternative for nano-scale computing. However, little work on QCA has studied designing implementation-friendly programmable QCA circuits. This paper fills this gap by presenting a novel QCA-based programmable logic array (PLA) structure. In addition to being compact, the proposed PLA structure exploits some unique properties of QCA cells to achieve ease of implementation, programming and defect detection. These features are indispensable to the successful adoption of any nano-scale circuits
We present a simplification algorithm for manifold polygonal meshes of plane-dominant models. Models of this type are likely to appear in man-made environments. While traditional simplification algorithms focus on gen...
详细信息
We present a simplification algorithm for manifold polygonal meshes of plane-dominant models. Models of this type are likely to appear in man-made environments. While traditional simplification algorithms focus on generality and smooth meshes, the approach presented here considers a specific class of man-made models. By detecting and classifying edge loops on the mesh and providing a guided series of binary mesh partitions, our approach generates a series of simplified models, each of which better respects the semantics of these kinds of models than conventional approaches do. A guiding principle is to eliminate simplifications that do not make sense in constructed environments. This, coupled with the concept of "punctuated simplification", leads to an approach that is both efficient and delivers high visual quality. Comparative results are given.
The information technology revolution has driven the pace of competition and rapid globalization. Consequently, enterprises increasingly need to consider and pursue fundamental change - transformation - to maintain or...
详细信息
We study hybrid search schemes for unstructured peer-to-peer networks. We quantify performance in terms of number of hits, network overhead, and response time. Our schemes combine flooding and random walks, look ahead...
详细信息
By bianalytic functions, the boundary integral formula of the stress function for the elastic problem in a circle plane is developed. But this integral formula includes a strongly singular integral and can not be dire...
详细信息
By bianalytic functions, the boundary integral formula of the stress function for the elastic problem in a circle plane is developed. But this integral formula includes a strongly singular integral and can not be directly calculated. After the stress function is expounded to Fourier series, making use of some formulas in generalized functions to the convolutions, the boundary integral formula which does not include strongly singular integral is derived further. Then the stress function can be got simply by the integration of the values of the stress function and its derivative on the boundary. Some examples are given. It shows that the boundary integral formula of the stress function for the elastic problem is convenient.
This paper is an overview of Software engineering 2004, the Software engineering volume of the computing Curricula 2001 project. We briefly describe the contents of the volume, the process used in developing the volum...
详细信息
This paper is an overview of Software engineering 2004, the Software engineering volume of the computing Curricula 2001 project. We briefly describe the contents of the volume, the process used in developing the volume's guidelines, and how we expect the volume to be used in practice.
This paper proposes a novel system design using a chip multiprocessor (CMP) to provide intrusion tolerance and self-recovery for server applications. Our platform provides three major advantages over previously propos...
详细信息
ISBN:
(纸本)0769522769
This paper proposes a novel system design using a chip multiprocessor (CMP) to provide intrusion tolerance and self-recovery for server applications. Our platform provides three major advantages over previously proposed approaches, 1) security insulation from remote exploits and attacks;2) close coupling between processor cores in a CMP to ensure immediate logging, fine-grained inspection and fast recovery;3) concurrent and fine-grained inspection, logging and recovery techniques that are off of the critical path. We have designed a multi-point defense and recovery system to defeat remote exploits. We used a checkpoint based approach to recover server applications under attack. It takes a snapshot of the application's context and memory state before it handles the next request. If the request turns out to be malicious, the system can discard the malicious request and rollback the application's state to a known good one through checkpointing. We have also designed an rapid recovery system for kernel space rootkit attacks. Our intrusion survivable and self-recovery design provides reliable production services that System Administrators are seeking.
We study hybrid search schemes for unstructured peer-to-peer networks. We quantify performance in terms of number of hits, network overhead, and response time. Our schemes combine flooding and random walks, look ahead...
详细信息
We study hybrid search schemes for unstructured peer-to-peer networks. We quantify performance in terms of number of hits, network overhead, and response time. Our schemes combine flooding and random walks, look ahead and replication. We consider both regular topologies and topologies with supernodes. We introduce a general search scheme, of which flooding and random walks are special instances, and show how to use locally maintained network information to improve the performance of searching. Our main findings are: (a) a small number of supernodes in an otherwise regular topology can offer sharp savings in the performance of search, both in the case of search by flooding and search by random walk, particularly when it is combined with 1-step replication. We quantify, analytically and experimentally, that the reason of these savings is that the search is biased towards nodes that yield more information. (b) There is a generalization of search, of which flooding and random walk are special instances, which may take further advantage of locally maintained network information, and yield better performance than both flooding and random walk in clustered topologies. The method determines edge critically and is reminiscent of fundamental heuristics from the area of approximation algorithms.
CBSD needs to customize and compose components. Customization and composition can cause faults which are hard to detect by existing testing techniques, since components have different structures from traditional progr...
详细信息
暂无评论